Ira Wilsker's archive

I frequently hear about Internet users who always clean all of their cookies, citing fears of privacy issues or identity theft. If I ask some of those users what an Internet cookie is, I receive a variety of replies indicating a multiplicity of definitions varying from somewhat accurate to wildly inaccurate. There is equal misunderstanding about the functions of cookies and the degree of risk they pose to the user.

shadow

While almost all major security products implement a variety of techniques to protect against unknown malware, so called “zero day” attacks have been especially successful in penetrating most security utilities.

shadow

It should be no surprise that smart computing devices are outselling traditional desktop and laptop computers. There is an intensive battle for market share of operating systems for these smart devices, which includes smart phones, tablets and related devices. The primary combatants are Google with its Android operating system, Apple with its iOS, and Microsoft with its newly released Windows 8 version for smart devices.

shadow